You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/remove-rbcd-microsoft-entra-seamless-single-sign-on-account.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: 'Security assessment: Remove Resource Based Constrained Delegation for Microsoft Entra seamless SSO account'
3
3
description: This article describes Microsoft Defender for Identity's Microsoft Entra Seamless Single sign-on (SSO) account with Resource Based Constrained Delegation (RBCD) applied security posture assessment report.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/cas-compliance-trust.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ Defender for Cloud Apps operates in the Microsoft Azure data centers in the foll
29
29
|---------|---------|
30
30
|**Customers whose tenants are provisioned in the United States**| United States |
31
31
|**Customers whose tenants are provisioned in the European Union or the United Kingdom**| Either the European Union and/or the United Kingdom |
32
-
|**Customers whose tenants are provisioned in any other region**| The United States and/or a data center in the region that's nearest to the location of where the customer's Microsoft Entra tenant has been provisioned |
32
+
|**Customers whose tenants are provisioned in any other region**| The United States and/or a data center in the region that's nearest to the location of where the customer's Microsoft Entra tenant has been provisioned.|
33
33
34
34
In addition to the locations above, the App Governance features within Defender for Cloud Apps operate in the Microsoft Azure data centers in the following geographical regions listed below. Customer with App Governance enabled will have data stored within the data storage location the customer provisions in above, and in a second data storage location as described below:
35
35
@@ -45,7 +45,7 @@ In addition to the locations above, the App Governance features within Defender
45
45
|**Customers whose tenants are provisioned in Japan**| Japan |
46
46
|**Customers whose tenants are provisioned in India**| India |
47
47
|**Customers whose tenants are provisioned in Asia Pacific**| Asia Pacific |
48
-
|**Customers whose tenants are provisioned in any other region**| The United States and/or a data center in the region that's nearest to the location of where the customer's Microsoft Entra tenant has been provisioned |
48
+
|**Customers whose tenants are provisioned in any other region**| The United States and/or a data center in the region that's nearest to the location of where the customer's Microsoft Entra tenant has been provisioned.|
49
49
50
50
Customer data collected by Defender for Cloud Apps is either stored in your tenant location, as described in the previous tables, or in the geographic location of another online service that Defender for Cloud Apps shares data with, as defined by the data storage rules of that online service.
51
51
@@ -71,4 +71,4 @@ Defender for Cloud Apps shares data, including customer data, among the followin
71
71
72
72
## Related content
73
73
74
-
For more information, see the [Microsoft Service Trust portal](https://www.microsoft.com/en-us/trust-center/product-overview).
74
+
For more information, see the [Microsoft compliance offerings](/compliance/regulatory/offering-nist-sp-800-171).
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/protect-office-365.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,7 +96,8 @@ Defender for Cloud Apps integrates directly with [Microsoft 365's audit logs](/m
96
96
- Events from **Exchange**, **Power BI**, and **Teams** will only appear after activities from those services are detected in the portal.
97
97
98
98
99
-
-[Multi-geo deployments](/microsoft-365/enterprise/microsoft-365-multi-geo) are only supported for OneDrive
99
+
-[Multi-geo deployments](/microsoft-365/enterprise/microsoft-365-multi-geo) are only supported for OneDrive.
100
+
- Events from **Exchange** reflect the actor, which is either the application or the user, that performed the action.
100
101
101
102
### Microsoft Entra integration
102
103
@@ -153,12 +154,12 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
153
154
1. After Microsoft 365 is displayed as successfully connected, select **Done**.
154
155
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
155
156
156
-
SaaS Security Posture Management (SSPM) data is shown in the Microsoft Defender Portal on the **Secure Score** page. For more information, see [Security posture management for SaaS apps](/defender-cloud-apps/security-saas).
157
+
SaaS Security Posture Management (SSPM) data is shown in the Microsoft Defender Portal on the **Secure Score** page. For more information, see [Security posture management for SaaS apps](/defender-cloud-apps/security-saas).
157
158
158
-
> [!NOTE]
159
-
> After connecting Microsoft 365, you will see data from a week back including any third-party applications connected to Microsoft 365 that are pulling APIs. For third-party apps that weren't pulling APIs prior to connection, you see events from the moment you connect Microsoft 365 because Defender for Cloud Apps turns on any APIs that had been off by default.
159
+
> [!NOTE]
160
+
> After connecting Microsoft 365, you will see data from a week back including any third-party applications connected to Microsoft 365 that are pulling APIs. For third-party apps that weren't pulling APIs prior to connection, you see events from the moment you connect Microsoft 365 because Defender for Cloud Apps turns on any APIs that had been off by default.
160
161
161
-
If you have any problems connecting the app, see [Troubleshooting App Connectors](troubleshooting-api-connectors-using-error-messages.md).
162
+
If you have any problems connecting the app, see [Troubleshooting App Connectors](troubleshooting-api-connectors-using-error-messages.md).
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/troubleshooting-api-connectors-using-error-messages.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
-
title: Troubleshoot App Connector error messages
2
+
title: Troubleshoot App Connector errors
3
3
description: This article provides a list of API App connector error messages as well as resolution recommendations for each.
4
4
ms.date: 01/29/2023
5
5
ms.topic: conceptual
6
6
---
7
-
# Troubleshooting App Connector error messages
7
+
# Troubleshooting App Connector errors
8
8
9
9
10
10
@@ -14,6 +14,9 @@ This article provides a list of API App connector error messages and resolution
14
14
15
15
App connector errors can be seen in the app connector dialog after attempting to connect a cloud app using the API App connector.
16
16
17
+
> [!NOTE]
18
+
> If a connector experiences a failure or disconnection, a system alert will be generated. To resume normal operations and maintain connectivity, reconnect the connector on the connectors page.
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)
29
+
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
30
30
31
31
> [!IMPORTANT]
32
32
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
0 commit comments